/openbmc/linux/tools/testing/selftests/bpf/progs/ |
H A D | verifier_helper_access_var_len.c | 62 : __imm(bpf_probe_read_kernel) in bitwise_and_jmp_correct_bounds() 120 : __imm(bpf_probe_read_kernel) in bitwise_and_jmp_wrong_max() 152 : __imm(bpf_probe_read_kernel) in memory_stack_jmp_correct_bounds() 184 : __imm(bpf_probe_read_kernel) in stack_jmp_signed_correct_bounds() 208 : __imm(bpf_probe_read_kernel) in memory_stack_jmp_bounds_offset() 231 : __imm(bpf_probe_read_kernel) in memory_stack_jmp_wrong_max() 255 : __imm(bpf_probe_read_kernel) in stack_jmp_no_max_check() 312 : __imm(bpf_probe_read_kernel) in jmp_signed_no_min_check() 342 __imm(bpf_probe_read_kernel), in memory_map_jmp_correct_bounds() 375 __imm(bpf_probe_read_kernel), in memory_map_jmp_wrong_max() [all …]
|
H A D | verifier_helper_value_access.c | 61 __imm(bpf_probe_read_kernel), in access_to_map_full_range() 87 __imm(bpf_probe_read_kernel), in access_to_map_partial_range() 136 __imm(bpf_probe_read_kernel), in map_out_of_bound_range() 162 __imm(bpf_probe_read_kernel), in access_to_map_negative_range() 188 __imm(bpf_probe_read_kernel), in via_const_imm_full_range() 216 __imm(bpf_probe_read_kernel), in via_const_imm_partial_range() 269 __imm(bpf_probe_read_kernel), in imm_out_of_bound_range() 297 __imm(bpf_probe_read_kernel), in const_imm_negative_range_adjustment_1() 324 __imm(bpf_probe_read_kernel), in const_imm_negative_range_adjustment_2() 352 __imm(bpf_probe_read_kernel), in via_const_reg_full_range() [all …]
|
H A D | bpf_syscall_macro.c | 47 bpf_probe_read_kernel(&tmp, sizeof(tmp), &PT_REGS_PARM1_SYSCALL(real_regs)); in BPF_KPROBE() 50 bpf_probe_read_kernel(&arg2, sizeof(arg2), &PT_REGS_PARM2_SYSCALL(real_regs)); in BPF_KPROBE() 51 bpf_probe_read_kernel(&arg3, sizeof(arg3), &PT_REGS_PARM3_SYSCALL(real_regs)); in BPF_KPROBE() 52 bpf_probe_read_kernel(&arg4_cx, sizeof(arg4_cx), &PT_REGS_PARM4(real_regs)); in BPF_KPROBE() 53 bpf_probe_read_kernel(&arg4, sizeof(arg4), &PT_REGS_PARM4_SYSCALL(real_regs)); in BPF_KPROBE() 54 bpf_probe_read_kernel(&arg5, sizeof(arg5), &PT_REGS_PARM5_SYSCALL(real_regs)); in BPF_KPROBE()
|
H A D | verifier_const_or.c | 22 : __imm(bpf_probe_read_kernel) in constant_should_keep_constant_type() 40 : __imm(bpf_probe_read_kernel) in not_bypass_stack_boundary_checks_1() 59 : __imm(bpf_probe_read_kernel) in register_should_keep_constant_type() 78 : __imm(bpf_probe_read_kernel) in not_bypass_stack_boundary_checks_2()
|
H A D | loop6.c | 44 bpf_probe_read_kernel(&sg, sizeof(sg), sgp); in __sg_next() 50 bpf_probe_read_kernel(&sg, sizeof(sg), sgp); in __sg_next() 61 bpf_probe_read_kernel(&sgp, sizeof(sgp), sgs + i); in get_sgp() 83 bpf_probe_read_kernel(&len, sizeof(len), &sgp->length); in BPF_KPROBE() 93 bpf_probe_read_kernel(&len, sizeof(len), &sgp->length); in BPF_KPROBE()
|
H A D | trace_dummy_st_ops.c | 14 bpf_probe_read_kernel(&state, sizeof(__u64), (void *)st_ops_ctx); in BPF_PROG() 16 bpf_probe_read_kernel(&val, sizeof(__u32), (void *)state); in BPF_PROG()
|
H A D | test_task_pt_regs.c | 25 if (bpf_probe_read_kernel(current_regs, PT_REGS_SIZE, regs)) in handle_uprobe() 27 if (bpf_probe_read_kernel(ctx_regs, PT_REGS_SIZE, ctx)) in handle_uprobe()
|
H A D | bpf_iter_netlink.c | 41 bpf_probe_read_kernel(&group, sizeof(group), &nlk->groups[0]); in dump_netlink() 58 bpf_probe_read_kernel(&ino, sizeof(ino), &inode->i_ino); in dump_netlink()
|
H A D | task_kfunc_common.h | 34 status = bpf_probe_read_kernel(&pid, sizeof(pid), &p->pid); in tasks_kfunc_map_value_lookup() 48 status = bpf_probe_read_kernel(&pid, sizeof(pid), &p->pid); in tasks_kfunc_map_insert()
|
H A D | cgrp_kfunc_common.h | 35 status = bpf_probe_read_kernel(&id, sizeof(id), &cgrp->self.id); in cgrps_kfunc_map_value_lookup() 49 status = bpf_probe_read_kernel(&id, sizeof(id), &cgrp->self.id); in cgrps_kfunc_map_insert()
|
H A D | test_module_attach.c | 95 bpf_probe_read_kernel(&buf, 8, ret); in BPF_PROG() 96 bpf_probe_read_kernel(&buf, 8, (char *)ret + 256); in BPF_PROG()
|
H A D | kfree_skb.c | 88 bpf_probe_read_kernel(&pkt_type, sizeof(pkt_type), _(&skb->__pkt_type_offset)); in BPF_PROG() 92 bpf_probe_read_kernel(&pkt_data, sizeof(pkt_data), data + 12); in BPF_PROG()
|
H A D | test_skb_helpers.c | 25 bpf_probe_read_kernel(&tpid , sizeof(tpid), &task->tgid); in test_skb_helpers()
|
H A D | task_kfunc_failure.c | 201 status = bpf_probe_read_kernel(&pid, sizeof(pid), &task->pid); in BPF_PROG() 285 bpf_probe_read_kernel(task->comm, 16, task->comm); in BPF_PROG()
|
H A D | profiler.inc.h | 158 if (bpf_probe_read_kernel(dst, len, src)) in probe_read_lim() 161 if (bpf_probe_read_kernel(dst, 1, src)) in probe_read_lim() 400 bpf_probe_read_kernel(&arr_struct->array[0], in trace_var_sys_kill() 415 bpf_probe_read_kernel(&arr_struct->array[i], in trace_var_sys_kill() 434 bpf_probe_read_kernel(&arr_struct->array[index], in trace_var_sys_kill() 442 bpf_probe_read_kernel(&arr_struct->array[index], in trace_var_sys_kill() 649 bpf_probe_read_kernel(kill_data, sizeof(*past_kill_data), in raw_tracepoint__sched_process_exit()
|
H A D | test_skmsg_load_helpers.c | 40 bpf_probe_read_kernel(&tpid , sizeof(tpid), &task->tgid); in prog_msg_verdict()
|
H A D | bpf_iter_unix.c | 20 bpf_probe_read_kernel(&ino, sizeof(ino), &inode->i_ino); in sock_i_ino()
|
H A D | bpf_iter_udp4.c | 20 bpf_probe_read_kernel(&ino, sizeof(ino), &inode->i_ino); in sock_i_ino()
|
H A D | bpf_iter_udp6.c | 27 bpf_probe_read_kernel(&ino, sizeof(ino), &inode->i_ino); in sock_i_ino()
|
H A D | test_verify_pkcs7_sig.c | 62 ret = bpf_probe_read_kernel(&value, sizeof(value), &attr->value); in BPF_PROG()
|
H A D | iters_state_safety.c | 169 : __imm_ptr(iter), ITER_HELPERS, __imm(bpf_probe_read_kernel) in compromise_iter_w_helper_write_fail()
|
/openbmc/linux/tools/lib/bpf/ |
H A D | bpf_core_read.h | 46 bpf_probe_read_kernel( \ 56 bpf_probe_read_kernel( \ 247 bpf_probe_read_kernel(dst, sz, (const void *)__builtin_preserve_access_index(src)) 368 ___core_read(bpf_probe_read_kernel, bpf_probe_read_kernel, \ 404 ___core_read(bpf_probe_read_kernel_str, bpf_probe_read_kernel, \
|
H A D | usdt.bpf.h | 153 err = bpf_probe_read_kernel(&val, sizeof(val), (void *)ctx + arg_spec->reg_off); in bpf_usdt_arg() 165 err = bpf_probe_read_kernel(&val, sizeof(val), (void *)ctx + arg_spec->reg_off); in bpf_usdt_arg()
|
/openbmc/linux/tools/perf/util/bpf_skel/ |
H A D | augmented_raw_syscalls.bpf.c | 388 bpf_probe_read_kernel(&augmented_args->args, sizeof(augmented_args->args), args); in sys_enter() 409 bpf_probe_read_kernel(&exit_args, sizeof(exit_args), args); in sys_exit()
|
/openbmc/linux/kernel/bpf/preload/iterators/ |
H A D | iterators.bpf.c | 69 bpf_probe_read_kernel(&t, sizeof(t), types + btf_id); in get_name()
|